Field of the Invention
[0001] The present invention generally relates to a passenger information system (PIS).
Background of the Invention
[0002] Passenger information systems are widely implemented in public transportation vehicles
such as trains, trams, metros and buses. They are used to provide information to passengers
that is relevant for their journey. This information is presented to the passenger
by information terminals. Such a terminal can be a screen to present the information
in a visual way or a speaker to present the information in an audible way.
[0003] A passenger information system further comprises an interfacing system for inputting
information into the passenger information system. To this respect, it typically features
a microphone, a telephone handset, a keyboard or a touch screen. In most public transportation
vehicles, the interfacing system is located within the public area of the vehicle,
i.e. in a location where passengers are allowed, for example near the entrance doors.
This way, an operator has quick and easy access to the passenger information system.
In a train for example, the guard or conductor needs to be able to operate the passenger
information system from within at least each carriage or passenger car.
[0004] To protect the passenger information system from unauthorized use, there is a need
for protecting this interfacing system.
[0005] A common protection measure is a lockable door such that the interfacing system can
only be operated by a user that has the proper key. This key is typically in the form
of a skeleton key, more specifically a railway carriage key. Such key has the advantage
that an operator of the transport vehicle can use the key on different transport vehicles
thereby avoiding the problem of centralized key management. For most public transport
vehicles, it is indeed important that the passenger information system can be operated
without centralized control and that any authorized person can easily access the information
system when entering any of the operated transport vehicles.
[0006] A problem with these skeleton keys is that they are available for purchase to the
public. Therefore, they do no longer form a proper protection against unauthorized
use of the passenger information system. Anyone with such a railway carriage key can
now gain access to the interfacing system for the passenger information system. This
is highly undesirable as it may lead to disinformation that is presented to the passenger.
Summary of the Invention
[0007] It is an object of the present invention to overcome the above identified problem
and to provide a passenger information system that is better protected against unauthorized
use while avoiding complicated centralized authorization schemes.
[0008] This object is achieved, according to a first aspect, by passenger information system
for a public transport vehicle comprising one or more public compartment accessible
by users of the transport vehicle and comprising a restricted compartment accessible
by an operator of the transport vehicle to which users of the transport vehicle are
not allowed access. The passenger information system comprises:
- one or more passenger information terminal for communicating information to the users
when located in the one or more public compartment; and
- a first electronic identification device configured to exchange an electronic identification
with the operator when located in the restricted compartment and to register the electronic
identification with the passenger information system as a registered electronic identification;
and
- an interfacing system comprising one or more inputting means for inputting information
into the passenger information system and further comprising a second electronic identification
device configured to receive an electronic identification from a user of the interfacing
system;
and wherein the passenger information system is further arranged to authorize the
inputting of information via the inputting means when the electronic identification
from the user matches the registered electronic identification.
[0009] In other words, the inputting means can only be operated when a valid electronic
identification is provided to the interfacing system. Such electronic identification
is much safer than a mechanical lock that can be opened with a skeleton key.
[0010] Moreover, the inputting means is only operable with an electronic identification
that has been registered with the passenger information system, i.e. registered from
within the transport vehicle. Even more, this registration can only be done from within
a restricted location on the transport vehicle, i.e. an operator must be within this
restricted location to register his electronic identification with the passenger information
system. Only from then on, the operator can input information into the passenger information
system from an interfacing system elsewhere in a public area on the train. Therefore,
any electronic key comprising an electronic identification is useless until this registration
process has been performed.
[0011] The above passenger information system avoids the need for a centralized key management.
In other words, any operator that enters the transport vehicle can register himself
locally. Because of the specific area from where the registration must be done, the
passenger information system is protected by the intrinsic security offered by the
restricted compartment in the transport vehicle. Therefore, when an operator registers
his electronic identification, the security offered by the restricted area is equally
applicable to the complete passenger information system.
[0012] This passenger information system may for example be provided in a train, a metro,
a bus or a tram.
[0013] The interfacing system may further comprise a mechanical lock unlockable by a skeleton
key, preferably by a railway carriage key. Thus, the passenger information system
may be combined with conventional protection mechanisms. For example, the passenger
information system may be retrofitted into passenger vehicles that comprise public
compartments with lockable cabinets that house the inputting means.
[0014] The first and/or second electronic identification device may for example be selected
from the group consisting of:
- a keyboard,
- a cardreader,
- a wireless card reader,
- a Radio-Frequency Identification, RFID, reader,
- a Near Field Communication, NFC, reader; and
- a finger-print reader.
[0015] The inputting means may for example be selected from the group consisting of:
- a network interface for connecting a communication device to the passenger information
system (154);
- a microphone (142);
- a telephone handset (142);
- a keyboard; and
- a touch screen.
[0016] According to an embodiment of the invention, the restricted compartment is a driver's
compartment. Therefore, the operator needs to come into the driver's compartment to
register his electronic identification. As the driver is always present in the driver's
compartment during use of the transportation vehicle, it can be assured that registration
is always supervised or checked by an authorized person.
[0017] According to an embodiment, the passenger information system is further arranged
to automatically erase all registered electronic identifications each time the passenger
information system is rebooted. This has the advantage that electronic identifications
do not remain in the passenger information system too long because this could pose
be a potential security risk. This is especially advantageous because in general most
transport vehicles are powered down at least once a day.
[0018] According to an embodiment, the passenger information system is further arranged
to perform the authorization temporarily. This makes sure that the inputting means
become automatically unusable for an unauthorized person after use by the operator.
To do so, the passenger information system may be further arranged to de-authorize
the inputting of information via the inputting means after the inputting of information.
[0019] According to a second aspect, the invention relates to a public transportation vehicle
comprising a passenger information system according to the first aspect.
[0020] According to a third aspect, the invention relates to a computer-implemented method
for protecting access to a passenger information system installed in a public transport
vehicle comprising the following steps:
- exchanging by a first electronic identification device a first electronic identification
with an operator when located in a restricted compartment of the public transport
vehicle; and
- registering the electronic identification in a data store for storing registered electronic
identifications; and
- receiving by a second electronic identification device a second electronic identification;
and wherein the second electronic identification device is part of an interfacing
system; the interfacing system further comprising inputting means for inputting information
into the passenger information system;
- authorizing inputting information into the passenger information system via the inputting
means when the second electronic identification matches one of the registered electronic
identifications in the data store.
[0021] According to a fourth aspect, the invention relates to a data processing system comprising
means for carrying out the method according to the third aspect.
[0022] According to a fifth aspect, the invention relates to a computer program product
comprising instructions which, when the program is executed by a computer, cause the
computer to carry out the method according to the third aspect.
[0023] According to a sixth aspect, the invention relates to a computer-readable storage
medium comprising instructions which, when executed by a computer, cause the computer
to carry out the method according to the third aspect.
Brief Description of the Drawings
[0024]
Fig. 1 illustrates a part of a train comprising a passenger information system according
to an embodiment of the invention; and
Fig. 2 illustrates interconnected components of a passenger information system according
to an embodiment of the invention; and
Fig. 3 illustrates steps performed by a first electronic identification device of
the passenger information system according to an embodiment of the invention; and
Fig. 4 illustrates a suitable computing system for performing the steps according
to various embodiments of the invention; and
Fig. 5 illustrates steps performed by a second or third electronic identification
device of the passenger information system according to an embodiment of the invention.
Detailed Description of Embodiment(s)
[0025] The present invention relates to a Passenger Information System, shortly PIS. Fig.
1 and 2 illustrate a part of a train 100 with a PIS 200 according to an embodiment
of the invention. Train 100 comprises a driver's compartment 103 with a driver's seat
110. Train 100 may further comprise a second driver's compartment at the opposite
side. The driver's compartment 103 is part of the restricted area 101 of the train.
Passengers of the train 100 are not permitted in the restricted areas. Such a restricted
area is typically defined by the operating body that operates the train. A restricted
area is normally labelled as such and may further be protected by a door 109. Door
109 may further comprise a lock that can be opened by a dedicated key or by a skeleton
key. Other areas in the train 100 besides the driver's compartment 103 may also be
labelled as a restricted area, for example a separate cabin dedicated for the guard
or conductor of the train or a technical area. Besides the restricted area 101, the
train 100 also comprises a public area 102. In the public area, passengers of the
train 100 are allowed access when they have a valid transport ticket. The public area
102 may comprise a separate entry and exit compartment 105. This compartment 105 comprises
sliding doors 132 for providing the passengers access to the train 100. Compartment
105 further comprises a second door 108 providing the passengers access to a second
public compartment 104. Public compartment 104 may comprises a plurality of passenger
seats 107 and tables 106.
[0026] The PIS 200 as illustrated in Fig. 2 is installed in train 100. PIS 200 may be installed
in any public transport vehicle that features at least one restricted area 101 and
one public area 102. This is typically the case for a metro, bus, tram, train or airplane.
[0027] The PIS 200 comprises information terminals 123-126 for outputting information to
the passengers when they are in the public area 102. PIS 200 may for example comprise
a screen 123, 124 for displaying travelling information in the seating area 104. PIS
200 may further comprise speakers 125, 126 for providing audible travel information
to the passengers.
[0028] The PIS 200 further comprises a first electronic identification device 131. First
identification device 131 is arranged to exchange an electronic identification code
with a user that is present in the restricted area 101. To this respect, identification
device 131 is adapted to obtain the electronic identification from the user and/or
for providing the identification code to the user. PIS 200 may further comprise a
data store 132 for storing the exchanged electronic identification code. In Fig. 2,
the first electronic identification device 131 is shown within the restricted area
101, but it may also be arranged outside the restricted as long as the identification
code can only be exchanged when the user is within the restricted area 101. An identification
code is to be understood as a piece of data that can be related to the user or to
an object carried by the user such that the user is identifiable by the PIS 200 information
system upon presenting the identification code.
[0029] Different available systems may be used for exchanging the identification code and
for the electronic identification device 131. Examples of such systems are:
- A card reader as the electronic identification device 131 located in the restricted
area 101. The user then carries a card adapted to carry an electronic identification
code. Upon arrival in the restricted area, the user inserts the card in the card reader
upon which the electronic identification code is exchanged with the card reader.
- The card reader may also be a wireless card reader such that it suffices to hold the
card against or near the wireless card reader. Such wireless card reader and card
may for example use Radio-Frequency Identification, RFID, technology to exchange the
identification code.
- The electronic identification device 131 may also correspond to a fingerprint reader
installed in the restricted area 101. The electronic identification is then a digital
representation of the fingerprint of the user. Therefore, when the user is in the
restricted area, he has his fingerprint scanned by the fingerprint reader.
- The electronic identification device 131 may also correspond to a Near Field Communication,
NFC, reader. The identification code may then be exchanged with any device or object
supporting NFC such as for example a smart watch, a mobile phone, a tablet and the
like.
- The electronic identification device 131 may also correspond to a keyboard located
in the restricted area. In this case, the user may enter any key sequence into the
keyboard as the electronic identification.
[0030] Fig. 3 illustrates steps performed when exchanging an identification code with electronic
identification device 131 when the user is located in the restricted area 101. When
operational, the electronic identification device 131 waits for input by a user in
step 301. When a user interacts with the electronic identification device 131, the
method proceeds to step 302 where the identification code is exchanged between the
user or an object carried by the user and the electronic identification device 131.
Exchanging the electronic identification code may comprise:
- Sending an electronic identification code from the electronic identification device
131 to the user. The electronic identification code may further be randomly generated
or selected from a predefined list of electronic identification codes.
- Receiving an electronic identification code from the user directly, e.g. by keyboard
input or from an object carried by the user, e.g. a card or mobile communication device.
The electronic identification code may be hardcoded onto this object or generated
randomly.
The method then proceeds to step 303 where the exchanged electronic identification
code is stored within the Passenger Information System as a registered electronic
identification.
[0031] PIS 200 further comprises one or more interfacing systems 122, 150. These systems
122, 150 are arranged for inputting information into the passenger information system
200 such that the status of the PIS can be changed or adapted.
[0032] In the example of Fig. 1 and 2, PIS 200 comprises an interfacing system 122 located
in the public area 122, more particular in the entrance compartment 105. Interfacing
system 122 comprises a handset 142 as inputting means for inputting audible information
into the PIS 200. This way, the operator of train 100 may speak to the passenger through
the speakers 125 and 126. Interfacing system 122 may further comprise other inputting
means for inputting information into PIS 200 such as for example a microphone, a keyboard
for inputting information that is to be displayed on screens 123, 124 or a touch screen
143. Interfacing system 122 may further comprise any suitable computing system 144
used for processing the inputted information and exchanging data with the PIS 200.
Optionally, the interfacing system 122 comprises a mechanical lock 141 for securing
the other components 142, 202, 143, 144 from unauthorized access, i.e. from passengers
in the public area 102. This lock may be unlockable by a skeleton key such as a railway
carriage key.
[0033] Interfacing system 122 further comprises a second electronic identification device
202. This second device 202 is arranged to obtain an electronic identification code
from a user that wishes to input information into the PIS 200. Second electronic identification
device 202 may be similar to the first electronic identification device 131. PIS 200
is further arranged to only allow a user of the interfacing system 122 to input information
into the PIS 200 when the electronic identification code received by the second electronic
identification device 202 is a registered electronic identification code, i.e. an
electronic identification that has already been exchanged between the first electronic
identification device 131 and the user. This way, it is assured that the user of interfacing
system 122 is an authorized user, i.e. a user that has been registered to the PIS
200 when located in the restricted area 102.
[0034] Fig. 5 illustrates steps performed by PIS 200 for authorizing a user to input information
into the PIS 200 by the inputting means 142. When a user accesses the interfacing
system 122, for example by opening lock 141, then the PIS 200 will be in a waiting
state 501. Thereupon, when the user provides his electronic identification to the
electronic identification device 202 the method proceeds to step 502 and receives
the electronic identification. In a subsequent step 503, the PIS 200 verifies whether
the received electronic identification code matches any of the stored registered identification
codes, i.e. any of the codes that has been exchanged with the first electronic identification
device 131 in the restricted area 102. When there is no match, the method returns
to step 501 and waits for a new receival of an electronic identification. Optionally,
a further message or signal may be generated for signalling the failed authorization.
When there is a match, the method proceeds to step 504 and unlocks or authorizes the
access to the inputting means allowing the user to input information into the PIS
200. When all information has been inputted, the user may execute a command to lock
the inputting means, thereby proceeding to step 505. Thereafter the PIS 200 locks
or de-authorizes the access to the inputting means in step 506. Thereafter, the method
returns to step 501 where it waits for the reception of a new electronic identification.
Alternatively, to receiving the locking command in step 505, the PIS 200 may also
automatically de-authorize access to the inputting means. For example, PIS may de-authorize
access to the inputting means after a predetermined duration. This duration may start
after the last use of the inputting means or after the unlocking in step 504.
[0035] The steps of Fig. 5 have been illustrated with reference to the interfacing system
122. According to an embodiment, similar step may be performed for accessing the interfacing
system 150. Interfacing system 150 comprises a networking switch 153 that connects
different networking components of PIS 200 together, i.e. components 123 and 126.
Networking switch 153 further comprises an empty or open networking port 154 which
can be used for accessing and configuring PIS 200. Port 154 may be a dedicated configuration
port through which PIS 200 can be configured or adapted. To this respect, networking
switch 153 can be seen as inputting means for providing information to the PIS 200.
To protect the switch 153 from unauthorized access, the interfacing system 150 further
comprises a third electronic identification device 152. By performing the same steps
as described with reference to Fig. 5, a user may gain access to configuration port
154 of switch 153, i.e. by first providing a registered electronic identification
to the third electronic identification device 152. When the user is authorized, then
PIS 200 enables port 154 on switch 153 such that the user can gain access to PIS 200,
i.e. the user can make changes to PIS 200. Similar to interfacing system 122, system
150 may also comprise a mechanical lock 151 unlockable by a railway carriage key.
[0036] The above steps performed by PIS 200 with reference to Fig. 3 and 5 may be performed
on any suitable computing means that has access to the components of PIS 200 necessary
for performing the authorization and de-authorization. These components comprise the
first electronic device 131, a data store 132 for storing the registered electronic
identifications, the inputting means 142, 153 that are to be protected and the electronic
identification devices 202, 152 for receiving the electronic identifications. Preferably,
all components of PIS 200 are interconnected by a communication network 127 such as
an ethernet network or the like.
[0037] To limit the amount of registered electronic identifications and the duration that
the identifications reside in the PIS 200, different means may be provided to erase
registered identifications from data store 132 and, hence, to deregister users from
the PIS 200. First, a deregistration functionality may be provided at different locations
within the train 100, for example in the restricted area 101 or in the public are
102. Electronic identification devices 131, 202 and 152 may for example also be arranged
for deregistering a user from the PIS 200. Second, deregistration may be performed
automatically after a predefined duration, for example a certain time after the last
receival of an identification or a certain time after the registration of the identification.
Third, deregistration may be performed automatically upon rebooting the PIS 200, for
example by using a volatile memory 132 for storing the electronic identifications.
[0038] Fig. 4 shows a suitable computing system 400 for performing steps according to the
above embodiments. Computing system 400 may in general be formed as a suitable general-purpose
computer and comprise a bus 410, a processor 402, a local memory 404, one or more
optional input interfaces 414, one or more optional output interfaces 416, a communication
interface 412, storage element interface 406 and one or more storage elements 408.
Bus 410 may comprise one or more conductors that permit communication among the components
of the computing system. Processor 402 may include any type of conventional processor
or microprocessor that interprets and executes programming instructions. Local memory
404 may include a random-access memory, RAM, or another type of dynamic storage device
that stores information and instructions for execution by processor 402 and/or a read
only memory, ROM, or another type of static storage device that stores static information
and instructions for use by processor 404. Input interface 414 may comprise one or
more conventional mechanisms that permit an operator to input information to the computing
device 400, such as a keyboard 420, a mouse 430, a pen, voice recognition and/or biometric
mechanisms, etc. Output interface 416 may comprise one or more conventional mechanisms
that output information to the operator, such as a display 440, a printer 450, a speaker,
etc. Communication interface 412 may comprise any transceiver-like mechanism such
as for example an Ethernet interface that enables computing system 400 to communicate
with other devices and/or systems of the PIS 200. The communication interface 412
of computing system 400 may be connected to such another computing system by means
of a local area network, LAN thereby forming network 127. Storage element interface
406 may comprise a storage interface such as for example a Serial Advanced Technology
Attachment, SATA, interface or a Small Computer System Interface, SCSI, for connecting
bus 410 to one or more storage elements 408, such as one or more local disks, for
example SATA disk drives, and control the reading and writing of data to and/or from
these storage elements 408. Although the storage elements 408 above is described as
a local disk, in general any other suitable computer-readable media such as a removable
magnetic disk, optical storage media such as a CD or DVD, -ROM disk, solid state drives,
flash memory cards, ... could be used.
[0039] Although the present invention has been illustrated by reference to specific embodiments,
it will be apparent to those skilled in the art that the invention is not limited
to the details of the foregoing illustrative embodiments, and that the present invention
may be embodied with various changes and modifications without departing from the
scope thereof. The present embodiments are therefore to be considered in all respects
as illustrative and not restrictive, the scope of the invention being indicated by
the appended claims rather than by the foregoing description, and all changes which
come within the meaning and range of equivalency of the claims are therefore intended
to be embraced therein. In other words, it is contemplated to cover any modifications,
variations or equivalents that fall within the scope of the basic underlying principles
and whose essential attributes are claimed in this patent application. It will furthermore
be understood by the reader of this patent application that the words "comprising"
or "comprise" do not exclude other elements or steps, that the words "a" or "an" do
not exclude a plurality, and that a single element, such as a computer system, a processor,
or another integrated unit may fulfil the functions of several means recited in the
claims. Any reference signs in the claims shall not be construed as limiting the respective
claims concerned. The terms "first", "second", third", "a", "b", "c", and the like,
when used in the description or in the claims are introduced to distinguish between
similar elements or steps and are not necessarily describing a sequential or chronological
order. Similarly, the terms "top", "bottom", "over", "under", and the like are introduced
for descriptive purposes and not necessarily to denote relative positions. It is to
be understood that the terms so used are interchangeable under appropriate circumstances
and embodiments of the invention are capable of operating according to the present
invention in other sequences, or in orientations different from the one(s) described
or illustrated above.
1. A passenger information system (200) for a public transport vehicle (100) comprising
one or more public compartment (102, 104, 105) accessible (108, 132) by users of the
transport vehicle and comprising a restricted compartment (101, 103) accessible by
an operator of the transport vehicle to which users of the transport vehicle are not
allowed access (109); said passenger information system (200) comprising:
- one or more passenger information terminal (123, 124, 125, 126) for communicating
information to the users when located in the one or more public compartment; and
- a first electronic identification device (131) configured to exchange an electronic
identification with the operator when located in the restricted compartment (101,
103) and to register the electronic identification with the passenger information
system (200) as a registered electronic identification; and
- an interfacing system (122, 150) comprising one or more inputting means (142, 144,
154) for inputting information into the passenger information system (200); and comprising
a second electronic identification device configured to receive an electronic identification
from a user of the interfacing system (122, 150);
and wherein the passenger information system is further arranged to authorize the
inputting of information via said inputting means (142, 144, 154) when the electronic
identification from the user matches the registered electronic identification.
2. Passenger information system (200) according to claim 1 wherein the public transport
vehicle is a train (100), a metro, a bus or a tram.
3. Passenger information system (200) according to claim 1 or 2 wherein the interfacing
system further comprises a mechanical lock (141, 151) unlockable by a skeleton key,
preferably by a railway carriage key.
4. Passenger information system (200) according to any one of the preceding claims wherein
the first and second electronic identification device comprises at least one of the
group of:
- a keyboard,
- a cardreader,
- a wireless card reader,
- a Radio-Frequency Identification, RFID, reader,
- a Near Field Communication, NFC, reader; and
- a finger-print reader.
5. Passenger information system (200) according to any one of the preceding claims wherein
the inputting means comprises at least one of the group of:
- a network interface for connecting a communication device to the passenger information
system (154);
- a microphone (142);
- a telephone handset (142);
- a keyboard; and
- a touch screen.
6. Passenger information system (200) according to any one of the preceding claims wherein
the restricted compartment is a driver's compartment.
7. Passenger information system (200) according to any one of the preceding claims further
configured to automatically erase all registered electronic identifications each time
the passenger information system (200) is rebooted.
8. Passenger information system (200) according to any one of the preceding claims further
arranged to perform the authorization temporarily.
9. Passenger information system (200) according to claim 8 further arranged to de-authorize
the inputting of information via said inputting means (142, 144, 154) after the inputting
of information.
10. A public transportation vehicle (100) comprising a passenger information system (200)
according to any one of the preceding claims.
11. A computer-implemented method for protecting access to a passenger information system
(200) installed in a public transport vehicle comprising the following steps:
- exchanging (302) by a first electronic identification device (131) a first electronic
identification with an operator when located in a restricted compartment of the public
transport vehicle; and
- registering (303) the electronic identification in a data store for storing registered
electronic identifications; and
- receiving (502) by a second electronic identification device a second electronic
identification; and wherein the second electronic identification device is part of
an interfacing system; the interfacing system further comprising inputting means (142,
144, 154) for inputting information into the passenger information system (200);
- authorizing (504) inputting information into the passenger information system (200)
via the inputting means (142, 144, 154) when the second electronic identification
matches one of the registered electronic identifications in the data store.
12. A data processing system comprising means for carrying out the method of claim 11.
13. A computer program product comprising instructions which, when the program is executed
by a computer, cause the computer to carry out the method of claim 11.
14. A computer-readable storage medium comprising instructions which, when executed by
a computer, cause the computer to carry out the method of claim 11.